Analysis
-
max time kernel
96s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:44
Behavioral task
behavioral1
Sample
eac8c8b3b5d88a02358330b6f1027624_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac8c8b3b5d88a02358330b6f1027624_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
eac8c8b3b5d88a02358330b6f1027624_JaffaCakes118.pdf
-
Size
80KB
-
MD5
eac8c8b3b5d88a02358330b6f1027624
-
SHA1
fd6022d69d762c85c894de1b6431dd10c186fd19
-
SHA256
08840e9479037f20435b6f4e987986b7581fb51bd8d7684f4eb338e2be3cb758
-
SHA512
b1f3b8f03a49b88e5e2bd4ef04280df858425e51419fd5c0d26e3ba184a7b3a220f8ce93417cea689d6d9522b9c5e2dd991bfc71e2cb0116ab748f22852c1e36
-
SSDEEP
1536:ratmCW5mepKwPSWrIHsDvP81FUE8YVUWxFk1gr9qZWOpOwrZFVsZR5kW:W0Cmm4ZIMn8AE8YV/NqWwrvarT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3020 AcroRd32.exe 3020 AcroRd32.exe 3020 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eac8c8b3b5d88a02358330b6f1027624_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD523cd179c1cee6c7d3135b9028af69ac6
SHA114e59c8d0260eabde037124e706a475ac267ee1a
SHA256aefd5bc809a47a07df890b8ea24e26bd9955a223405cd656959c2b1c87e85dd5
SHA5129b4f2994dbe5cb02fd355a5065b113fc05a88342139ae4ab4918680a4256440e12c916a747cf6935ed6e30810e26ceb2e521e1b8ff063e79af08e2c55a433166